BufferZone Pro puts a protective buffer between your system and a downloaded or otherwise suspect program. Emptying the buffer discards the program with all its file and Registry changes. BufferZone Pro does affect performance, and I found a few bugs.

BufferZone Pro protects your computer from malware by running all suspect programs in a sort of virtual quarantine. The window for any software running in this buffer zone gets a telltale red border, and you can deny the software access to important files in My Documents and other folders. To wipe out any system changes that the questionable code has tried to make, you simply empty the buffer. You must ensure that you're starting with a clean PC, though; BufferZone won't clean up a preexisting mess.

//Compare Similar Products

Like GreenBorder Pro, BufferZone automatically manages your browser and any files downloaded through it. But GreenBorder gives limited privileges to suspect code that it launches, which can cause problems for both legitimate programs and malware; BufferZone doesn't apply this restriction. And GreenBorder manages only Internet Explorer and Firefox; BufferZone also supports P2P programs, e-mail clients, instant-messaging programs, and additional browsers. An option even lets you configure it to run all programs launched from other locationssuch as USB drives, CD-ROMs, and network drivesinside the buffer zone. Emptying the zone terminates all managed programs and can be used to wipe out their file and Registry changes.

The utility's virtualization doesn't work as seamlessly as that of Altiris SVS (software that's not specifically security-related) or GreenBorder. BufferZone moves protected files to folders in a separate virtual repository and replaces the originals with shortcuts. For example, it would move a file named C:\Malware\bad.exe to C:\Virtual\Untrusted\C_\Malware.bad.exe and replace the file with a shortcut named bad.exe.virtual.lnk. A program outside the zoneWindows Explorer, for examplewill see the shortcut. Applications inside the zone will be fooled into thinking that they see the original file. When they write to or read that file, BufferZone redirects their actions to the copy it moved into its repository. To store virtualized Registry keys, BufferZone uses a similar technique, which causes Start menu items added by programs in the zone to have names like "My Program.virtual"an odd side effect.

By default, BufferZone prevents anything running in the zone from accessing your Microsoft Outlook data and My Documents files; you can extend this protection to other folders. A number of advanced options let you do fine-tuning. If your e-mail client isn't on BufferZone's list, you can add it, which tells the utility to run the client outside the zone but keep any attachments or other saved files inside. You can identify specific applications as trusted, ensuring that they always run outside the zone. When you add a program to the trusted installations list, BufferZone will run that programand anything it installs outside of the zone.

The nominal firewall, which has just one predefined rule (to prevent programs in the buffer zone from using port 25 to send e-mail) won't replace your third-party firewall or even the one built into Microsoft Windows.Next: Staying in the Zone

Automatic Renewal Program: Your subscription will continue without interruption for as long as you wish, unless
you instruct us otherwise. Your subscription will automatically renew at the end of the term unless you authorize
cancellation. Each year, you'll receive a notice and you authorize that your credit/debit card will be charged the
annual subscription rate(s). You may cancel at any time during your subscription and receive a full refund on all
unsent issues. If your credit/debit card or other billing method can not be charged, we will bill you directly instead. Contact Customer Service